The Tao of Open Source Intelligence

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

How do you conduct an online investigation when much of the Internet isn't indexed by search engines yet? Accessing and using the information that's freely available online is about more than just relying on the first page of Google results. This book provides a guide to Open Source Intelligence (OSINT) techniques for the investigator. Topics include: tools and investigative approaches that are required when conducting research within the surface, deep and dark webs; how to scrutinise criminal activity without compromising your anonymity - and your investigation; relevance of cyber geography and how to get around its limitations; useful add-ons for common search engines, as well as metasearch engines; deep-web social media platforms and platform-specific search tools; Internet security, how to strike a balance between security, ease of use and functionality, giving tips on counterintelligence, safe practices and debunking myths about online privacy.

Author(s): Stewart K. Bertram
Edition: 1
Publisher: IT Governance Publishing
Year: 2015

Language: English
Pages: 117

Cover
The Tao of Open Source
Title
Copyright
Preface
About the Author
Acknowledgements
Dedication
Contents
Introduction: “What Can Open Source Intelligence Do For Me?”
Four key concepts
What to expect from the rest of this book
Chapter 1: The Surface Web
Web browsers – the first steps
Flexibility
Extendibility with Add-Ons
Speed
Search engines
Search engines – meta search engines
Cyber geography
(Slightly below) the Surface Web
Metadata (subsurface data)
Specialist search syntax
Specialist web investigation tools
Suggested search and the knowledge of the crowd
Conclusion
Chapter 2: Deep Web
The Deep Web and social media technology
The core principles of networks and how they affect investigations on Deep Web social media platforms
Theory into practice
Platform-specific search tools
The importance of identity online
Final theoretical points
Conclusion
Chapter 3: The Dark Web
What is the Dark Web and where did it come from?
The importance of The Onion Router (TOR) to the Dark Web
The .onion pseudo-Top Level Domain
So much for the theory – now what?
Ticket to ride – now where?
Investigating the Dark Web
Tor2web and the growth of the ‘Borderlands’
Conclusion
Chapter 4: Internet Security for the Smart Investigator
Security: two brief principles
Creating a dedicated research infrastructure
Giving away your identity on the Internet
Going underground – Virtual Private Networks
Advanced concepts of surveillance and detection
Leaving no trace (mitigating scenario 2):
Counterintelligence within OSINT
Encryption
Smart security – using the appropriate solution at the appropriate time
Conclusion
“What can OSINT do for me?”
Annex A: Tips for Building a Credible Sock Puppet
ITG Resources